BlackMatter Speeds Up Data Theft with New Tool

BlackMatter Speeds Up Data Theft with New Tool

Security researchers have discovered a new data exfiltration tool designed to accelerate information theft for ransomware groups using the BlackMatter variant. The Symantec Threat Hunter team explained in a new blog post today that the custom tool is the third discovery of its kind, following the development of the Ryuk Stealer tool and the LockBit-linked StealBit. Dubbed “Exmatter,” it is designed to steal specific file types from selected directories and then upload them to a…

Read More

Conti Group Leak Celebs’ Data After Ransom Attack on Jeweller

Conti Group Leak Celebs’ Data After Ransom Attack on Jeweller

Data on countless celebrities, politicians and heads of state appear to be in the hands of ransomware actors after a group using the Conti variant compromised a high-end jeweler over the weekend. London-based Graff, which sells diamond jewelry to the super-rich, confirmed the news in a statement sent to Sky News. “Regrettably we, in common with a number of other businesses, have recently been the target of a sophisticated – though limited – cyber-attack by…

Read More

Euro Police Swoop on 12 Suspected Ransomware Gang Members

Euro Police Swoop on 12 Suspected Ransomware Gang Members

Twelve threat actors were singled out by Europol last week in a major ransomware operation targeting multiple organized crime groups. The unnamed suspected are believed to have been involved in deploying the LockerGoga, MegaCortex and Dharma variants or laundering the proceeds, the trans-national policing group claimed. Focusing their efforts mainly on large organizations, the suspects impacted over 1800 victims in 71 countries, it added. Individual players had specific roles, such as: gaining initial network access…

Read More

vRealize Operations Capacity Shows 100% Cluster Utilisation

vRealize Operations Capacity Shows 100% Cluster Utilisation

Recently we were examining a vSphere cluster where vRealize Operations Manager was showing 100% CPU utilisation, with zero capacity remaining. However, the usage of all resources in the cluster was generally low. We know that the cluster capacity is based on demand rather than usage. CPU demand is the amount of CPU resources a virtual machine would use if there were no CPU contention or limit. Sometimes, this can cause a little confusion when we…

Read More

Nation States Will Weaponize Social and Recruit Bad Guys with Benefits in 2022

Nation States Will Weaponize Social and Recruit Bad Guys with Benefits in 2022

McAfee Enterprise and FireEye recently released its 2022 Threat Predictions. In this blog, we take a deeper dive into the continuingly aggressive role Nation States will play in 2022. Prediction: Lazarus Wants to Add You as a Friend By Raj Samani We love our social media. From beefs between popstars and professional pundits, to an open channel to the best jobs in the industry. But guess what? The threat actors know this, and our appetite…

Read More

How a layered defense strategy protects organizations from security incidents occurring at the seams

How a layered defense strategy protects organizations from security incidents occurring at the seams

How a layered defense strategy protects organizations from security incidents occurring at the seams This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

OT Security: Risks, Challenges and Securing your Environment

OT Security: Risks, Challenges and Securing your Environment

Before the revolution of Information Technology (IT), the world experienced the revolution of Operational Technology (OT). Operational Technology is the combination of hardware and software that controls and operates the physical mechanisms of industry. OT systems play an important role in the water, manufacturing, power, and distribution systems that transformed industry into the modern age. All of these systems function to operate, automate, and manage industrial machines. With the rise of the internet within the…

Read More

Multi-Cloud Use Maturity – Cloud Security – Cloud Blog – VMware

Multi-Cloud Use Maturity – Cloud Security – Cloud Blog – VMware

This blog on Cloud Security represents part 8 and is the last installment of this multi-part blog series on multi-cloud use maturity.  A comprehensive eBook that includes the entire multi-cloud use maturity framework can be found here.  At the end of this blog, you can also find links to all the prior blogs in this series. Security remains a top cloud concern It seems like no matter what research study you pick up that involves the…

Read More

October 2021 Newsletter – Docker Blog

October 2021 Newsletter – Docker Blog

The latest and greatest content for developers. Webinar | Management & Security at Scale with Docker Business See how Docker Business enables centralized management and security for organizations. Register Now! Check out this recap of the Screaming in the Cloud episode, Heresy in the Church of Docker Desktop with Scott Johnston.  [Learn More] The latest edition of the Docker Index is in, and it shows continued growth in activity across the Docker community. [Learn More] Watch how…

Read More

What Do Social Media Companies Know About You?

What Do Social Media Companies Know About You?

What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you use social media, the more those companies likely know.  The moment you examine the question more closely, the answer takes on greater depth. Consider how much we use social media for things other than connecting with friends. While that was the original intent behind social networks, the role of social media has since evolved into something far more…

Read More
1 2,181 2,182 2,183 2,184 2,185 2,760